We solemnly declare that we will do our utmost to protect the personal data and privacy rights of customers (hereinafter referred to as 'customers' or 'you') who use our software services. When you operate our software services, we may need to collect and process your personal information. With this privacy statement (hereinafter referred to as 'Statement'), we explain to you the rules and details on which we process your personal information, with the aim of ensuring the greatest protection of your legal rights.
Before you start using our software services, we strongly recommend that you carefully read and fully understand this privacy policy. You can only continue to use our services after you fully understand and agree to all the terms of this policy. If you have any objections to this policy, it may affect the integrity or effectiveness of your use of the software services. In this case, we recommend that you stop using the software services.
After reading this policy, if you have any questions about this policy or matters related to it, you can contact us through the feedback channels listed in the 'How to Contact Us' section of this policy, and we will respond to you as soon as possible. This policy will help you understand the following:
1. How we collect and use personal information
2. How we use COOKIES or similar technologies
3. Personal information we may share, transfer, and disclose
4. How we store and protect personal information
5. How to manage your personal information
6. Third-party services
7. Protection of minors
8. Revision and Notification
9. How to contact us
1. How We Collect and Use Personal InformationThe core purpose of collecting your personal information is to enhance the convenience and satisfaction of you and other users when using this software service. We are committed to providing all internet users with a secure, enjoyable, and safe online experience, and your information is crucial for us to achieve this vision.
1.1 We will collect and obtain your personal information through the following ways:
1.1.1 Information provided by you:
(1)The information you provide to us when you register an account for this software service or use this software service;
(2)The shared information you provide to third parties through this software service, as well as the information stored when you use this software service. Please note that the content you upload or share in the public areas of this software service, as well as your comments on other users' uploaded or shared content, may be viewed and collected by other users. This information may be used for other purposes by others. If you find that someone is improperly collecting or using your personal information, you can provide feedback to us through the contact information provided in the 'Contact Us' section of this privacy policy.
1.1.2 Information shared by third parties about you. That is, information about you shared by third parties when using this software service.
1.1.3 The information we obtain from you. When you use this software service, we collect, aggregate, and record information, including log information, location information, and device information.
1.1.4 Note that personal information is stored for two years.
1.2 Face Data Policy 1.2.1 Special reminder to you, the facial data collected by this softwareWe analyze your photos to identify facial feature points (eyes, nose, mouth points) for face processing. We do not collect facial data. After the analysis is complete, all data will be deleted and no data will be saved. Refusing to provide the above information may prevent you from using core functions, but it will not affect the normal use of other features and services.
1.2.2 Purpose and process of collecting facial dataIn order to provide you with special effects related effects, we need to find out the complete process of facial feature points (eyes, nose, mouth points):
(1)Users will upload the selected images to our server through secure encryption methods;
(2)The server analyzes the facial features in the image you uploaded and integrates them into the template you selected;
(3)Once the synthesis is complete, the server will feedback the final visual effect to you through the application;
(4)The synthesized result (i.e., your "creation") will be temporarily saved in a secure, encrypted storage space and will be completely cleared after the production process ends. After the synthesis process is completed, we will immediately delete the facial images you uploaded to the server.
1.2.3 Sharing and Storage of Facial InformationWe promise not to disclose your facial recognition data to any third party, nor will we retain any facial information you submit. Once the facial feature analysis is completed, the pictures you uploaded will be completely deleted.
1.3 We will collect and use the following types of personal information for the following purposes:
We hope you understand that we are committed to continuously optimizing and improving our products and services. Therefore, as our products and services continue to develop, expand, and upgrade, we may regularly introduce new services or business features, or make adjustments to existing business functions. This may involve collecting new personal information or changing the purpose and manner of using personal information. If we plan to use your personal information for other purposes not covered by this policy, or to collect other personal information not mentioned in this policy, we will obtain your explicit consent through website prompts, user interactions, application notifications, or other means in accordance with the law. If you have any questions or need further explanation, please feel free to contact us through the communication channels listed in the "Contact Us" section of this policy. We will respond to your inquiries and feedback in a timely manner.
1.3.1 Help you complete registration and login
When you register, log in to this software, and use related services, you can create an account through your mobile phone number, and you can complete relevant online identity identification information (software account, avatar, password). We collect this information to help you complete the registration. Collecting mobile phone numbers is necessary to fulfill the national laws and regulations regarding network real-name system (real identity information authentication) requirements. If you refuse to provide a mobile phone number for registration and login, we may not be able to provide you with the corresponding services.
Based on our cooperation with third parties, when you use the "One-Click Login" feature, with your consent, we will use the phone number in your device as your registration and login account, eliminating the need for password or dynamic verification code verification, providing you with a quick registration and login service. If you do not wish to use the "One-Click Login" feature, you can register and log in to this software through other methods.
You can use a third-party account to register and log in to this software, but you need to authorize us to obtain information from the third-party platform (public profile picture and other information authorized by you) to generate an account for this software that is bound to the third-party account, allowing you to directly register, log in, and use this software and related services. In some cases, we may need to re-verify and bind your mobile phone number to confirm the authenticity and relevance of the third-party account.
We will generate a software account for your account when you register for this software. The software account is a public identification symbol for your account. You can choose to set up the software account according to your needs. You can independently fill in an avatar to complete your personal information. Not filling in information will not affect your use of the software account and services.
1.3.2 Maintain the normal operation of basic functions
In the process of using our services, in order to identify abnormal account states, understand product compatibility, and ensure the network and operational security of our software services, we may directly or indirectly collect and store information about the services you use and how you use them, and associate this information. This information includes:
(1)Log Information: When you use our services (including background operation and silent state), we may automatically collect detailed information about your use of our services, which will be saved as related network logs. This includes your login account, search query content, IP address, telecom operator, network environment, language used, visit date and time, as well as your web browsing history, Push open records, duration of stay, refresh records, and posting records.
(2)Device Information: When you use our services (including background operation and silent state), we may receive and record information related to the device you are using. This includes hardware model, operating system version number, device identifiers (Android: IMEI/MEID, AndroidID, OAID, IMSI, SIM card information (ICCID), GAID, device resolution, package name, device settings, process and software list, hardware serial number (SN); iOS: IDFV, IDFA; different identifiers vary in terms of validity period, whether they can be reset by the user, and how they are obtained), network device hardware address (device MAC address), hardware serial number, IP address, WLAN access point (SSID, BSSID), Bluetooth, Bluetooth address, base station, software version number, network access method, type, status, network quality data, device sensor data (accelerometer, linear accelerometer, gravity sensor, gyroscope sensor), and SD card data information. To collect the aforementioned basic personal device information, we will request permission to access your device information. We collect this information to provide you with our basic services and core functions. Refusing to grant the above permissions may result in your inability to use this software service.
(3)In order to prevent malicious programs, ensure operational quality and efficiency, we will collect information about installed applications, software lists or running process information, overall operation of applications, usage and frequency, application crash situations, overall installation and usage, performance data, and application sources.
(4)Please note that individual device information and log information are non-personal information that cannot identify specific natural persons. When we combine such non-personal information with other information to identify specific natural persons, or use it in conjunction with personal information, such non-personal information will be considered personal information during the period of combined use. Unless we obtain your authorization or there are other legal regulations, we will anonymize or de-identify such personal information. During the period of combined use, this information will be treated and protected as your personal information in accordance with this policy.
1.3.3 Use of the core service functions of this software
(1)When you use anime avatars, change gender, or more features, we will request sensitive permissions for device storage read and write and access to the album and camera. If you refuse to authorize, you will not be able to use this feature, but it will not affect your normal use of other functions of this software.
(2)When you save images or videos, you need to provide read and write permissions for device storage and access. If you refuse to authorize, you will not be able to use this feature, but it will not affect the normal use of other functions of this software.
Please note that the information you upload, publish, or save may contain your personal information or sensitive personal information. Please consider carefully before proceeding. If the information you upload, publish, or save involves the personal information of others, you should obtain their consent before publishing.
1.3.4 Helps you complete the order and payment services. When you order specific services in this software service, we will generate an order for the service through the system.
1.3.5 We provide you with WeChat customer service or other user response functions. When you contact our WeChat customer service or use other user response functions (personal information protection complaints or suggestions, other complaints and demands), we may need you to provide necessary personal information to match and verify your user identity, in order to ensure the security of your account and system. We may also save your contact information (used when you contact us or other contact information you provide to us), your communication/call records and content, and other necessary information related to your needs, in order to contact you or help you solve problems, or to record the handling plan and results of related issues.
1.3.6 Provide you with security protection
To enhance the security of your use of services provided by us and our partners, to protect the personal and property safety of you or other users or the public from infringement, to better prevent phishing websites, fraud, network vulnerabilities, computer viruses, cyber attacks, and network intrusion security risks, and to more accurately identify situations that violate laws and regulations or the relevant agreement rules of this software service, we may collect, use, or integrate your account information, transaction information, device information, log information, as well as information obtained by us or our partners with your authorization or shared according to law. This is to comprehensively judge the risk of your account and transactions, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposition measures in accordance with the law.
1.3.7 Display and push personalized advertisements for you
To ensure a good user experience, we provide you with a multitude of free and high-quality services, and strive to minimize the intrusion of irrelevant advertisements on you. Based on the information collected, we will perform feature analysis and user profiling on your preferences, browsing history, and usage habits, and present or recommend personalized (rather than universally pushed) advertisements to you through the advertising service provider/supplier system, in order to better meet your needs. Please be aware that this information is difficult or impossible to associate with your real identity, and we collect this information only to help us analyze and measure the effectiveness of advertisements and related services.
1.3.8 You understand and agree that some individual services of this software may require you to enable specific access permissions on your device in order to collect and use the information involved in these permissions:
(1)After you enable storage permissions, you allow us to access your storage space so that you can upload, download, and save content, or implement corresponding service functions through caching; After you enable device information permissions, you allow us to obtain your device information as a unique identifier for your device, so as to provide you with page displays that better meet your needs, understand product compatibility, identify abnormal states, and ensure the network and operational security of this software service;
(2)After you enable the photo album and camera permissions, you can upload photos/pictures/videos and realize various special effects and gameplay functions;
(3)You can choose to close these feature permissions at any time. Please note that by enabling any permission, you authorize us to collect and use relevant information to provide you with corresponding services. Once you close any permission, it means you have revoked the authorization, and we will no longer collect and use relevant information based on the corresponding permission, nor can we provide services corresponding to that permission. However, your decision to close permissions will not affect the collection and use of information based on your authorization that has already taken place.
1.3.9 Exceptions to obtaining authorized consent
According to relevant laws and regulations, the following situations do not require your authorization to collect your information:
(1) Directly related to national security and defense safety;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to criminal investigation, prosecution, trial, and judgment enforcement;
(4) Necessary to protect the life, property, or significant legal rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
(5) The personal information collected is publicly disclosed by you to the public;
(6) Necessary for signing and fulfilling contracts at your request;
(7) Collecting personal information from legally disclosed information, such as lawful news reporting and government information disclosure channels;
(8) Necessary to maintain the secure and stable operation of this software service, to discover and handle faults in the product or service;
(9) Necessary for conducting lawful news reporting;
(10) Necessary for conducting statistical or academic research for public interest, and when providing the results of academic research or descriptions to the public, de-identifying the information contained in the results;
(11)Other circumstances stipulated by laws and regulations.
1.4 Storage of Personal Information
Personal information will be stored on the server for a maximum of 2 years.
2. How do we use cookies or similar technologiesWe or our partners may obtain and use your information through cookies or similar technologies, and store this information as log information.
By using cookies, we provide users with a simple and enjoyable online experience. A cookie is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use cookies to benefit their users. COOKIES enable us to serve you better and faster, and make your experience with this software service more specific.
We and third-party partners may collect and use your information through cookies or similar technologies, and store that information.
We use our own cookies or similar technologies, which may be used for the following purposes:
(1) Remember your identity. COOKIES or similar technologies help us identify you as our registered user, or store other information you provide us about you;
(2) Analyze your usage of our services. We can use cookies or similar technologies to understand what activities you are using this software service for, or which services are most popular;
(3) Advertising optimization. COOKIES or similar technologies help us provide you with relevant advertisements based on your information, rather than conducting general advertising campaigns.
While using COOKIES or similar technologies for the above purposes, we may aggregate non personally identifiable information collected through COOKIES or similar technologies and provide it to advertisers and other partners for analysis of how you and other users use this software service and for advertising purposes.
There may be cookies or similar technologies placed by advertisers and other partners on this software service. These cookies and/or similar technologies may collect non personally identifiable information related to you for the purpose of analyzing how users use the service, sending you advertisements, or evaluating the effectiveness of advertising services. These third-party cookies or similar technologies that collect and use this information are not subject to this policy, but are subject to their own information protection statements. Please read the relevant policies carefully.
3. Personal information that we may share, transfer or disclose3.1 Sharing
We attach great importance to protecting your personal information. We will not share your personal information with any third party outside of this software without your separate consent, except in the following circumstances:
3.1.1 The sharing necessary to implement our services/functions.
In some cases, we may need to share your information with third parties to enable the functionality of our products and/or services and enable you to use the services you need normally, including: (1) sharing corresponding transaction order information and payment amount information with third-party payment institutions that provide payment services; (2) The necessary sharing with other suppliers, service providers, and business partners related to our services/features.
3.1.2 Necessary sharing with some of our partners.
In order to facilitate the smooth operation of necessary/reasonable business, meet your requirements, fulfill our obligations under relevant user agreements or this policy, and exercise our rights or comply with legal requirements, we may need to share your information with some partners, including: (1) sharing log information and device information with partners who provide data services (including online advertising monitoring, data statistics, and data analysis); (2) Share statistical data on your product usage (crashes, crashes) with partners who provide product analysis services (including application crash analysis, network performance analysis, domain name resolution optimization); (3) Share your relevant information (including device information, phone number) with partners who provide marketing services (including advertising and marketing); (4) Share with our promotional partners how many people have viewed their promotional information or purchased products after seeing it, or provide them with non personally identifiable statistical information to help them understand their audience or customers; (5) Necessary sharing with some of our partners.
3.1.3 Necessary sharing with our affiliates.
In order for us to provide you with consistent services based on a unified account system and to facilitate your unified management, ensure system and account security, your personal information may be necessary shared between us and our affiliates, including: (1) to help you save time and simplify the operation process, you do not need to register again to log in after registering our mobile account for this software, and your account related information will be necessary shared within our and our affiliates' products; (2) In order to provide you with a consistent content browsing and advertising service experience on our and our affiliates' products and/or services, you acknowledge and agree that your account information and device information may be shared with our affiliates.
3.1.4 To achieve the other purposes described in the first article of this policy, "How We Collect and Use Personal Information".
3.1.5 Fulfill our obligations and exercise our rights under this policy or other agreements we have reached with you.
3.1.6 Within the scope permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with the law, safeguard the interests, property or safety of us, our affiliates or partners, you or other users of this software, or the general public, prevent fraudulent and illegal activities, and reduce credit risks. However, this does not include information that is sold, rented, shared, or otherwise disclosed for profit in violation of the commitments made in this policy.
3.1.7 Upon your lawful request or with your authorized consent.
3.1.8 Provide your information at the lawful request of your guardian.
3.1.9 Provided in accordance with the individual service agreement (including electronic agreements signed online and corresponding platform rules) or other legal documents agreed upon with you.
3.1.10 Provided based on academic research.
3.1.11 Provided based on social public interests that comply with laws and regulations.
We will only share your personal information for lawful, legitimate, necessary, specific, and clear purposes. We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures.
3.2 Transfer
3.2.1 As our business continues to develop, we may engage in mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require new companies or organizations that hold your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
3.2.2 After obtaining your explicit consent, we will transfer your personal information to third parties.
3.3 Disclosure
We will only disclose your personal information under the following circumstances and with industry standard security measures in place:
3.3.1 According to your needs, disclose the information you have specified in the disclosure method that you have explicitly agreed to.
3.3.2 In cases where it is necessary to provide your information in accordance with laws, regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information based on the required information type and disclosure method. Subject to compliance with laws and regulations, when we receive a request for disclosure of the aforementioned information, we will require the recipient to provide corresponding legal documents, subpoenas, or investigation letters. We firmly believe that the information requested from us should be kept as transparent as possible within the limits permitted by law. We have carefully reviewed all requests to ensure that they have legal basis and are limited to data obtained by law enforcement agencies for specific investigation purposes and with legitimate rights.
3.4 Exceptions to obtaining prior authorization and consent for sharing, transferring, and disclosing information
In the following situations, sharing, transferring, or disclosing your information does not require your prior authorization and consent:
3.4.1 Directly related to national security and defense security;
3.4.2 Directly related to public safety, public health, and major public interests;
3.4.3 Directly related to criminal investigation, prosecution, trial, and enforcement of judgments through judicial or administrative law enforcement;
3.4.4 In order to safeguard your or other individuals' significant legitimate rights and interests in life and property, but it is difficult to obtain my consent;
3.4.5 Information that you disclose to the public on your own;
3.4.6 Collecting information from legally disclosed information through legitimate news reports and government information disclosure channels;
3.4.7 is related to our obligations under laws and regulations.
According to legal provisions, sharing, transferring, and disclosing personal information that has undergone de identification processing, and ensuring that the data recipient cannot recover and re identify the information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notification to you and your consent.
4. How do we store and protect personal information4.1 Storage of Personal Information: Unless otherwise stipulated by laws, regulations or regulatory authorities, we will only store your personal information for the shortest period of time necessary for the purposes stated in this policy. When we terminate our services or operations, we will promptly cease the activity of collecting your personal information. At the same time, we will comply with relevant laws and regulations and notify you in advance. After terminating our services or operations, we will delete or anonymize your personal information, except as otherwise provided by laws, regulations or regulatory authorities.
4.2 Protection of Personal Information
We attach great importance to information security and have established a dedicated security team to take all reasonable and feasible measures to protect your personal information
4.2.1 Data Security Technical Measures
We will adopt security measures that comply with industry standards, including establishing reasonable institutional norms and security technologies to prevent unauthorized access, use, and modification of your personal information, and to avoid data damage or loss.
Our service adopts various encryption technologies. In some of our software services, we will use encryption technology (SSL) to encrypt and store your personal information, and isolate it through isolation technology to protect your personal information.
When using personal information, we will use various data anonymization techniques to enhance the security of information during use, such as information display and information association calculation.
We will also adopt strict data access control and multi factor authentication technology to protect personal information and prevent data from being used in violation of regulations.
4.2.2 Other security measures we take to protect personal information
(1) We have an industry-leading data security management system centered around data lifecycle, which enhances the security of the entire system from multiple dimensions including organizational construction, system design, personnel management, and product technology. We manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management standards, and data security development standards.
(2) We implement comprehensive security controls on data through information contact confidentiality agreements, monitoring, and auditing mechanisms. We will also hold security and privacy protection training courses to enhance employees' awareness of security and their understanding of personal information protection policies and related regulations.
(3) We only allow employees and partners of this software who need to know this information to access your personal information, and have established strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of cooperation with this software.
(4) The Internet is not an absolutely secure environment, and the way email, instant messaging, social software or other service software communicates with other users cannot be determined whether it is fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention to protecting your information security. When communicating with third parties or purchasing goods and services through this software service, you inevitably need to disclose your information, contact information, or postal address to the counterparty or potential counterparty. Please protect your information properly and only provide it to others when necessary.
(5) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of the personal information you send us. Our physical, technological, or management protective facilities have been damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, which damages your legitimate rights and interests. We will bear corresponding legal responsibilities.
(6) Security incident handling
To address the potential risks of personal information leakage, damage, and loss, we have established multiple systems to clarify the classification and grading standards for security incidents and vulnerabilities, as well as corresponding processing procedures. We have also established an emergency response team for security incidents, which, in accordance with the requirements of security incident handling standards, initiates security plans for different security incidents, conducts stop loss, analysis, positioning, formulates remedial measures, and collaborates with relevant departments to trace and crack down on them. We also regularly organize internal training and emergency drills to enable our relevant staff to master the corresponding emergency response strategies and procedures.
After an unfortunate information security incident occurs, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you in accordance with legal requirements. We will also promptly inform you of the relevant situation of the event through email, letter, phone, and other means. If it is difficult to inform the information subject one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will proactively report the handling of information security incidents in accordance with regulatory requirements.
Please understand that due to technological limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% information security. You need to understand that the system and communication network you use to access this software service may experience issues due to situations beyond our control.
Please make sure to properly safeguard your account, password, and other identity elements. When you use this software service, we will identify your identity through your account, password, and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may have adverse effects on you. When you discover that your account, password, and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce related losses.
5. How to manage your personal information5.1 Access, Update, and Delete
We will make every effort to use appropriate technical means to ensure that you can access, update, and correct your registration information or other personal information provided when using our services. When accessing, updating, correcting, and deleting your personal information, we may require you to verify your identity to ensure the security of your account. The scope and manner in which you access, modify, and delete personal information will depend on the specific services you use. If you wish to stop sharing your location information while using location related services, you can use the mobile location shutdown function, software and hardware service providers, and communication service providers' shutdown methods to stop sharing. We recommend that you carefully read this policy.
5.2 Disclosure and Sharing
Our multiple services allow you to publicly share your relevant information not only with your social network, but also with all users who use the service, the information you upload or publish in this software service. As long as you do not delete the information you have publicly or shared, the relevant information may remain in the public domain; Even if you delete shared information, the information may still be independently cached, copied, or stored by other users or third parties beyond our control, or kept in the public domain by other users or such third parties. We are not responsible for any information leakage caused by your disclosure or sharing of information through the above-mentioned channels. Therefore, we remind and ask you to carefully consider whether to disclose or share your information through the above channels.
5.3 Account Cancellation
We support you to cancel your previously registered account at any time. You can do so through the following methods:
(1) Enter the account cancellation function through the software settings interface;
(2) Apply for cancellation by sending us an email;
If you apply to cancel your account by sending an email or WeChat customer service, we will verify and cancel your account within 15 days. After your account is cancelled, we will cease to provide you with all or part of the services of this software, and at your request, delete your personal information or anonymize it, except as otherwise provided by laws and regulations.
5.4 Change the scope of your authorized consent
You can choose whether to disclose personal information to us. Some personal information is necessary for using this software service, but the provision of most other information is determined by you. You can change the scope of your authorization for us to continue collecting information or revoke your authorization by deleting information, disabling device functions, or logging out of your account.
After revoking authorization, we are unable to continue providing you with the services corresponding to the revocation of authorization, and we will no longer process your corresponding information. But your decision to revoke authorization will not affect the information processing previously carried out based on your authorization.
5.5 Responding to your request
To ensure information security, you may need to confirm your identity in writing or through other means. We may need you to verify your identity before we can process your request. For your reasonable requests, we generally do not charge any fees, but for frequently repeated or beyond reasonable requests, we may charge certain cost fees based on the situation. We may choose not to process requests that are unreasonably repetitive, require significant technical investment (such as developing new systems or completely changing existing processes), may infringe on the legitimate rights and interests of others, or are completely unrealistic.
We may not be able to fulfill your request in the following situations:
5.5.1. When the request is related to our compliance with legal and regulatory obligations;
5.5.2. When the request is directly related to national security and defense security;
5.5.3. When the request is directly related to public safety, public health, or major public interests;
5.5.4. When the request is directly related to the investigation, prosecution, trial, and execution of criminal cases;
5.5.5. When we have conclusive evidence that you have engaged in malicious or abusive behavior;
5.5.6. When it is difficult to obtain your consent in order to protect your or others' significant legitimate rights and interests such as life and property;
5.5.7. When responding to your request may cause serious harm to your or other individuals' or organizations' legitimate rights and interests;
5.5.8. When the request involves trade secrets.
6. Third party servicesOur software services may interact or establish links with third-party services. Specifically, it includes:
6.1 You can use the "Share" function to send the content of this software service to third-party platforms, or introduce the content of third-party platforms into our services. These features may involve collecting your information (such as your usage logs) and using cookies on your device to ensure the proper functioning of these features;
6.2 We provide you with links through advertising or other service methods so that you can access third-party services;
6.3 Other interactions with third-party services. In order to achieve the purposes described in this privacy policy, we may integrate SDKs or other applications provided by third-party service providers (in the form of embedded code, plugins, etc.) to enhance customer service and user experience. At present, the third-party service providers we mainly access include the following categories:
-Advertising services, involving advertising display, advertising effectiveness monitoring/statistics;
-Payment services, including order payment, transaction verification, financial settlement, and payment data aggregation;
-Obtain location information, device information, and logs with your consent;
-Third party authorization services, such as logging in with third-party accounts and sharing content on third-party platforms;
-Functional support, including video playback, voice recognition, and data storage;
-Performance optimization, improving equipment distribution efficiency, reducing server costs, and quickly repairing functions;
-Security services, including network security monitoring, domain name resolution, anti hijacking, anti spam cheating, encryption and decryption.
Some of the third-party SDKs or applications we integrate may collect your personal information. When you use these third-party services in our services, you authorize them to directly collect and process your information. We will evaluate the legality, reasonableness, and necessity of the personal information collection behavior of these third-party services, and require them to take protective measures for your personal information while complying with relevant laws and regulations. You can also contact us through the channels provided in the "Contact Us" section of this policy, and we will provide you with answers as soon as possible.
7. Protection of Minors7.1 We attach great importance to protecting the personal information security of underage users. According to relevant laws and regulations, if you are under 14 years old, you need to obtain explicit written permission from your parents or legal guardians before using our software services.
7.2 If you are the guardian of a minor user and have any questions about the personal information of the minor under your guardianship, you can contact us through the contact information provided at the beginning of this agreement.
8. Revision and NotificationIn order to continuously improve your service experience, we may make timely adjustments to the terms of this privacy policy based on the latest developments in software services and updates to laws and regulations. These adjustments will automatically become part of the content of this policy. We will update any modifications made to the privacy policy on this page. If there are significant changes, we will notify you in a more prominent manner (such as through in app announcements, pop-up prompts, etc.), including but not limited to the following:
(1) Our service model has undergone significant changes, including the purpose, type, and usage of processing personal information;
(2) Our ownership structure has undergone significant changes, such as changes in ownership resulting from business restructuring, mergers and acquisitions, or bankruptcy;
(3) The main recipients of the sharing, transfer, or public disclosure of personal information have undergone significant changes;
(4) There have been significant changes in your rights and exercise of personal information processing;
(5) There have been significant changes in the responsible department, contact information, and complaint channels for handling personal information security;
(6) Other situations that may have a significant impact on your personal rights.
We always prioritize your satisfaction and take it into full consideration when making any modifications. We recommend that you regularly review our privacy policy when using our software services to ensure that you are aware of our latest policies.
9. How to contact usWe have established a dedicated personal data protection team to maintain the security of your personal data in accordance with this privacy policy. If you have any doubts about network security, or have any questions, feedback or suggestions regarding this privacy policy, software privacy protection measures, your personal information processing, etc., please contact our personal data protection officer. You can contact us through the following contact information:
Email: hxh9898@yeah.net
Usually, we will confirm your identity information after receiving your feedback, comments or suggestions, and respond within five working days.